Offensive Security

Offensive security tools for penetration testing, red team exercises, exploit development, and ethical hacking activities.

Explore 455 curated cybersecurity tools, with 16,024+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Filter by:
WSSiP Logo

A WebSocket Manipulation Proxy with a user interface to capture, intercept, and send custom messages for WebSocket and Socket.IO communications.

0
fexecve harness Logo

A collection of tools that execute programs directly in memory using various delivery methods including URL downloads and netcat connections.

0
steg86 Logo

steg86 is a steganographic tool that hides information within x86 and AMD64 binary executables without affecting their performance or file size.

0
Koadic Logo

A COM Command & Control framework that uses JScript to provide fileless remote access capabilities on Windows systems through a modular plugin architecture.

0
Log-Killer Logo

Tool for deleting logs on Linux/Windows servers.

0
Linux Exploit Suggester 2 Logo

A Linux exploit suggestion tool that identifies potential privilege escalation vulnerabilities by analyzing kernel versions and matching them against a database of known exploits.

0
Trust Direction: An Enabler for Active Directory Enumeration and Trust Exploitation Logo

A blog post explaining the concept of Active Directory Trusts and their enumeration and exploitation

0
FOCA (Fingerprinting Organizations with Collected Archives) Logo

FOCA is a tool used to find metadata and hidden information in scanned documents, with capabilities to analyze various file types and extract EXIF information.

0
Domain Logo

Setup script for Regon-ng

0
SharpEDRChecker Logo

SharpEDRChecker scans system components to detect security products and tools.

0
Loading Alternate Data Stream (ADS) DLL/CPL Binaries to Bypass AppLocker Logo

Utilizing Alternate Data Streams (ADS) to bypass AppLocker default policies by loading DLL/CPL binaries.

0
Exploit-Challenges Logo

A collection of vulnerable ARM binaries designed for educational exploit development and vulnerability research practice across different architectures and exploitation techniques.

0
Pwntools Logo

Pwntools is a Python CTF framework and exploit development library that provides tools for rapid prototyping and development of exploits and CTF challenge solutions.

0
Chameleon Logo

Chameleon aids in evading proxy categorization to bypass internet filters.

0
SprayingToolkit Logo

A collection of Python scripts for password spraying attacks against Lync/S4B & OWA, featuring Atomizer, Vaporizer, Aerosol, and Spindrift tools.

0
Security Intelligence Logo

Sysreptor offers a customizable security reporting solution for penetration testers and red teamers.

0
MadKing Amazon Web Services Attack Platform Logo

A project for demonstrating AWS attack techniques with a focus on ethical hacking practices.

0
Havoc Logo

Havoc is a malleable post-exploitation command and control framework that provides a client-server architecture with payload generation, customizable C2 profiles, and team collaboration capabilities for red team operations.

0
Vulnerable Node Logo

A vulnerable web site in NodeJS for testing security source code analyzers.

0
Habu Hacking Toolkit Logo

A Python-based network hacking toolkit that implements various attack and reconnaissance techniques for educational purposes and network security learning.

0
GEF (pronounced ʤɛf - 'Jeff') Logo

A set of commands for exploit developers and reverse-engineers to enhance GDB functionality.

0
Troy Hunt Logo

Sysreptor offers a customizable security reporting solution for penetration testers and red teamers.

0
Caldera Logo

Caldera is a cybersecurity framework by MITRE for automated security assessments and adversary emulation.

0
exploit_me Logo

A deliberately vulnerable ARM/ARM64 application with 14 different vulnerability levels designed for CTF-style exploitation training and education.

0

Stay Updated with Mandos Brief

Get the latest cybersecurity updates in your inbox

POPULAR

RoboShadow Logo

Automated vulnerability assessment and remediation platform

13
Cybersec Feeds Logo

A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.

7
TestSavantAI Logo

Security platform that provides protection, monitoring and governance for enterprise generative AI applications and LLMs against various threats including prompt injection and data poisoning.

5
OSINTLeak Logo

OSINTLeak is a tool for discovering and analyzing leaked sensitive information across various online sources to identify potential security risks.

5
Mandos Brief Cybersecurity Newsletter Logo

Weekly cybersecurity newsletter for security leaders and professionals

5
View Popular Tools →

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Offensive Security Tools - FAQ

Common questions about Offensive Security tools including selection guides, pricing, and comparisons.

Offensive security tools for penetration testing, red team exercises, exploit development, and ethical hacking activities.

Have more questions? Browse our categories or search for specific tools.